Vol. 11 No. 4 (2025): April
Open Access
Peer Reviewed

Enhancing Email Security Against Phishing Attacks Through User Behavior Analysis and Data Loss Prevention (DLP)

Authors

DOI:

10.29303/jppipa.v11i4.10781

Published:

2025-04-25

Downloads

Abstract

This study was conducted and aimed to improve email security against phishing attacks through user behavior analysis and data loss prevention (DLP). Phishing attacks pose a significant threat to the protection of user information and privacy, especially for individuals who are less aware of phishing emails. Their vulnerability to such attacks not only compromises their own security but also poses a great risk to the company. This can result in huge financial losses. Thus, there is an urgent need to improve security measures for users and systems. This study will use the NIST Cybersecurity Framework 2.0. This framework provides a structured approach to identifying and analyzing user behavior. Then an assessment of the phishing simulation is carried out to pay attention to users who are vulnerable to phishing attacks. After assessing the phishing email, the DLP configuration is determined for preventive measures. The following are the core functions of CSF as a framework that will be used: Based on the phishing simulation conducted, the pattern is almost the same, displaying the sender's email domain that is very similar to the original. Employees are usually easily trapped if they do not read the domain carefully and immediately follow the instructions in the email body. Phishing emails typically have a business context and are assumed to be sent by a trusted person, such as a supervisor, a colleague from the same department, or a different department. User behavior analysis is key to identifying vulnerabilities to phishing attacks. Understanding how users interact with emails can help develop effective mitigation strategies. Implementing DLP as a layer of defense can proactively detect and prevent phishing emails from reaching users’ inboxes. Proper DLP configuration is critical to a successful implementation. User education and training are critical components to raising awareness of phishing threats. Equipping users with the skills to recognize and avoid phishing attacks can significantly reduce an organization’s vulnerability.

Keywords:

Attacks Data Loss Prevention (DLP) Email Phishing Security User behavior

References

Abid, N. (2020). Advancements and Best Practices in Data Loss Prevention: A Comprehensive Review. Global Journal of Universal Studies, 1(1), 190–225. Retrieved from https://media.neliti.com/media/publications/590136-advancements-and-best-practices-in-data-a5521663.pdf

Adeyeri, A., & Abroshan, H. (2024). Geopolitical Ramifications of Cybersecurity Threats: State Responses and International Cooperations in the Digital Warfare Era. Information, 15(11), 682. https://doi.org/10.3390/info15110682

Ahmed, M. N., Mahmood, H., & Iqbal, Z. (2023). A Novel Framework for Email’s Data Leak Prevention Through Semantic Analysis. 2023 International Conference on It and Industrial Technologies (ICIT), 1–6. https://doi.org/10.1109/icit59216.2023.10335896

Alsharnouby, M., Alaca, F., & Chiasson, S. (2015). Why Phishing Still Works: User Strategies for Combating Phishing Attacks. International Journal of Human Computer Studies, 82, 69-82. https://doi.org/10.1016/j.ijhcs.2015.05.005

Aziz, F., Mayasari, N., Sabhan, S., Zulkifli, Z., & Yasin, M. F. (2022). The Future of Human Rights in the Digital Age: Indonesian Perspectives and Challenges. Journal of Digital Law and Policy, 2(1), 29–40. https://doi.org/10.58982/jdlp.v2i1.292

Beyer, J. L. (2023). The Politics of Cybersecurity and the Global Internet. Perspectives on Politics, 21(2), 664–668. https://doi.org/10.1017/s1537592723000361

Chaganti, R., Varadarajan, V., Gorantla, V. S., Gadekallu, T. R., & Ravi, V. (2022). Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture. Future Internet, 14(9), 1–20. https://doi.org/10.3390/fi14090250

Dawkins, S., & Jacobs, J. (2023). NIST Phish Scale User Guide. Gaithersburg: National Institute of Standards and Technology. https://doi.org/10.6028/NIST.TN.2276

Domnik, J., & Holland, A. (2024). On Data Leakage Prevention Maturity: Adapting The C2m2 Framework. Journal of Cybersecurity and Privacy, 4(2), 167–195. https://doi.org/10.3390/jcp4020009

Emenike, S. U. (2021). Data Loss Prevention in A Remote Work Environment. Retrieved from https://urn.kb.se/resolve?urn=urn%3anbn%3ase%3ahis%3adiva-20203

Firdaus, G. A., Sukowati, P., & Adi, D. S. (2023). Licensing of MSME Business Through Online Single Submission Risk Based Approach. Cross Current International Journal of Economics, Management and Media Studies, 5(02), 11–20. https://doi.org/10.36344/ccijemms.2023.v05i02.001

Hassib, B., & Shires, J. (2024). Digital Recognition: Cybersecurity and Internet Infrastructure in UAE–Israel Diplomacy. International Affairs, 100(6), 2399–2418. https://doi.org/10.1093/ia/iiae233

Montano, I. H., Diaz, J. R., Aranda, J. J. G., Molina-Cardín, S., López, J. J. G., & Díez, I. D. L. T. (2024). Securecipher: An Instantaneous Synchronization Stream Encryption System for Insider Threat Data Leakage Protection. Expert Systems with Applications, 254, 124470. https://doi.org/10.1016/j.eswa.2024.124470

Isaura, E. R., Chen, Y.-C., Su, H.-Y., & Yang, S.-H. (2020). The Relationship between Food Security Status and Sleep Disturbance Among Adults: A Cross-Sectional Study in An Indonesian Population. Nutrients, 12(11), 3411. https://doi.org/10.3390/nu12113411

ISO/IEC. (2018). ISO/IEC 27005: 2018 Information Security Risk Management-Guidelines. 2018. Retrieved from https://www.iso.org/standard/75281.html

Jaeger, L., Eckhardt, A., & Kroenung, J. (2021). The Role of Deterrability for the Effect of Multi-Level Sanctions on Information Security Policy Compliance: Results of a Multigroup Analysis. Information & Management, 58(3), 103318. https://doi.org/10.1177/14624745211068870

Kapoor, M. (2024). Comparative Analysis of AI Algorithms for Enhancing Phishing Detection in Real-Time Email Security. Aitoz Multidisciplinary Review, 3(1), 338–352.

Khan, A. W., Saeed, S., & Kakar, M. S. (2024). Cybersecurity as a Geopolitical Tool: The Growing Influence of Digital Warfare in Statecraft. International Research Journal of Social Sciences and Humanities, 3(2), 345–357. Retrieved from https://irjssh.com/index.php/irjssh/article/view/209

Khanna, A. (2024). Ransomware Prevention. In Securing An Enterprise (Bll 119–138). Apress. https://doi.org/10.1007/979-8-8688-1029-9_7

Kintonova, A., Vasyaev, A., & Shestak, V. (2021). Cyberbullying and Cyber-Mobbing in Developing Countries. Information & Computer Security, 29(3), 435–456. https://doi.org/10.1108/ics-02-2020-0031

Kovaitė, K., Šūmakaris, P., & Stankevičienė, J. (2020). Digital Communication Channels in Industry 4.0 Implementation. Management, 25(1), 171–191. https://doi.org/10.30924/mjcmi.25.1.10

Kulkarni, S., & Girish, G. N. (2024). Navigating The Abyss–Illuminating Data Leakage Threats, Mitigations, and Future Horizons. In Cloud Security (Bll 37–51). Chapman And Hall/Crc.

Leo, M., Sharma, S., & Maddulety, K. (2019). Machine Learning in Banking Risk Management: A Literature Review. Risks, 7(1), 29. https://doi.org/10.3390/risks7010029

Li, H., Ge, D., Liu, S., Zhang, W., Wang, J., Si, J., & Zhai, J. (2019). Baduanjin Exercise for Low Back Pain: A Systematic Review and Meta-Analysis. In Complementary Therapies In Medicine. https://doi.org/10.1016/j.ctim.2019.01.021

Liesnaia, Y., & Malakhov, S. (2023). The Analysis of Development, Typical Objectives and Mechanisms of Phishing Attacks. Computer Science and Cybersecurity, 1, 6–27. https://doi.org/10.26565/2519-2310-2023-1-01

Liu, S., & Kuhn, R. (2010). Data Loss Prevention. It Professional, 12(2), 10–13. https://doi.org/10.1109/mitp.2010.52

Mansikka, J. (2023). Data Loss Prevention: For Securing Enterprise Data Integrity. Retrieved from https://urn.fi/urn:nbn:fi:amk-2023101827711

Marcillo-Delgado, J. C., Alvarez-Garcia, A., & García-Carrillo, A. (2022). Communication Strategies on Risk and Disaster Management in South American Countries. International Journal of Disaster Risk Reduction, 76, 102982. https://doi.org/10.1016/j.ijdrr.2022.102982

Marques, L. (2024). Enhancing Data Breach Prevention Measures in Corporate Setting. Retrieved form https://repository.stcloudstate.edu/msia_etds/144

Moore, J. (2024). Keeping up with the NIST CyberSecurity Framework. Retrieved from https://medium.com/@jefferywmoore/keeping-up-with-the-nist-cybersecurity-framework-3ff9fd983cc9

Nayak, A., Patnaik, A., Satpathy, I., & Patnaik, B. C. M. (2024). Data Storage and Transmission Security in the Cloud. Indian Journal of Cryptography and Network Security, 2(2), 194–212. https://doi.org/10.4018/979-8-3693-1431-9.ch009

Omodara, H. (2022). Cloud Security: A Survey of Information Communication Technology (ICT) and Cybersecurity Professionals’ Perception on Data Loss Prevention (DLP) Measures for Software-as-a-Service (SaaS) Application-Related Data Breaches and Leakage. Retrieved from https://www.academia.edu/88587761/Cloud_Security_A_survey_of_Information_Communication_Technology_ICT_and_Cybersecurity

Omotunde, H., & Ahmed, M. (2023). A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond. Mesopotamian Journal of Cybersecurity, 2023, 115–133. http://dx.doi.org/10.58496/MJCSC/2023/016

Prince, N. U., Faheem, M. A., Khan, O. U., Hossain, K., Alkhayyat, A., Hamdache, A., & Elmouki, I. (2024). AI-Powered Data-Driven Cybersecurity Techniques: Boosting Threat Identification and Reaction. Nanotechnology Perceptions, 20, 332–353.

Saunders, A., Cornett, M. M., & Erhemjamts, O. (2021). Financial Institutions Management: A Risk Management Approach. Mcgraw-Hill.

Senapati, K. K., Kumar, A., & Sinha, K. (2023). Impact of Information Leakage and Conserving Digital Privacy. In Malware Analysis and Intrusion Detection in Cyber-Physical Systems (Bll 166–188). Igi Global. https://doi.org/10.4018/978-1-6684-8666-5.ch008

Shahbaznezhad, H., Kolini, F., & Rashidirad, M. (2021). Employees’ Behavior in Phishing Attacks: What Individual, Organizational, and Technological Factors Matter? Journal of Computer Information Systems, 61(6), 539–550. https://doi.org/10.1080/08874417.2020.1812134

Shishodia, B. S., & Nene, M. J. (2022). Data Leakage Prevention System for Internal Security. 2022 International Conference on Futuristic Technologies (INCOFT), 1–6. https://doi.org/10.1109/incoft55651.2022.10094509

Steves, M., Greene, K., & Theofanos, M. (2020). Categorizing Human Phishing Difficulty: A Phish Scale. Journal of Cybersecurity, 6(1), 1–16. https://doi.org/10.1093/cybsec/tyaa009

Syarova, S., Toleva-Stoimenova, S., Kirkov, A., Petkov, S., & Traykov, K. (2024). Data Leakage Prevention and Detection in Digital Configurations: А Survey. Environment, Technologies, Resources, Proceedings of The International Scientific and Practical Conference, 2, 253–258. https://doi.org/10.17770/etr2024vol2.8045

Vashishth, T. K., Sharma, V., Sharma, K. K., Kumar, B., Chaudhary, S., & Panwar, R. (2024). Enhancing Cloud Security. In Improving Security, Privacy, and Trust in Cloud Computing (Bll 85–112). Igi Global Scientific Publishing. https://doi.org/10.4018/979-8-3693-1431-9.ch004

Wang, C., Cheng, Z., Yue, X.-G., & Mcaleer, M. (2020). Risk Management of Covid-19 by Universities in China. Journal of Risk and Financial Management, 13(2), 36. https://doi.org/10.3390/jrfm13020036

Wendy, W. (2024). The Nexus between Financial Literacy, Risk Perception and Investment Decisions: Evidence from Indonesian Investors. Investment Management & Financial Innovations, 21(3), 135-147. http://dx.doi.org/10.21511/imfi.21(3).2024.12

Wiranata, G. A., Ucuk, Y., Subekti, S., & Sidarta, D. D. (2024). Pertanggungjawaban Pidana Terhadap Pelaku Tindak Pidana Phishing. Court Review: Jurnal Penelitian Hukum (E-Issn: 2776-1916), 4(02), 13–25. https://doi.org/10.69957/cr.v4i02.1503

Yadav, I., & Gupta, H. (2023). Designing Data Loss Prevention System for the Enhancement of Data Integrity in Cyberspace. 2023 5th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 1361–1365. https://doi.org/10.1109/ICAC3N60023.2023.10541823

Author Biographies

Tamara Sinatrya Yasmin, Swiss German University

Author Origin : Indonesia

Tomi Yulianto, Swiss German University

Author Origin : Indonesia

Downloads

Download data is not yet available.

How to Cite

Yasmin, T. S., & Yulianto, T. (2025). Enhancing Email Security Against Phishing Attacks Through User Behavior Analysis and Data Loss Prevention (DLP). Jurnal Penelitian Pendidikan IPA, 11(4), 590–600. https://doi.org/10.29303/jppipa.v11i4.10781